The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
-
Updated
May 27, 2025
The Web3 Security Resources Hub is a comprehensive collection of curated tools, guides, and best practices for securing decentralized systems and smart contracts in the blockchain space.
The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ai in web applications and to provide best practices for mitigating these risks.
A comprehensive Solidity Style Guide to ensure consistent, readable, and maintainable smart contracts. Features include coding conventions, best practices for gas optimization and security, standardized naming, and effective documentation techniques. Ideal for developers seeking to improve their Solidity projects.
AWS multi-account setup via IAC, with scripts for bootstrapping and custom usage
Master the AZ-104 certification with a comprehensive guide that seamlessly integrates Azure administration expertise and DevOps best practices for cloud
A PHP tool to lint PHP files for security issues based on CIS and OWASP best practices.
A model-agnostic security framework that brings secure-by-default practices to AI-assisted software development. This project provides a curated ruleset of security workflows, reusable command templates, and automated validations designed to catch misconfigurations, enforce compliance, and harden code during generation and review.
secure JWT Authentication with Refresh Token flow using ASP.NET Core Minimal API. Includes access token expiry handling, refresh token rotation, in-memory token store, middleware-based auth, and clean end-to-end API security implementation—ideal for learning modern backend authentication.
Personal cybersecurity repository of an ethical hacking expert, with guides on strengthening, customizing, and improving development environments.
The OpenSSL Key and Sign Utility is a Python script that provides a graphical user interface (GUI) for generating RSA key pairs, signing files, and verifying signatures using the OpenSSL command-line tool.
Security implementation guides covering modern security practices, authentication, authorization, and compliance frameworks
A secure, production-grade DevSecOps pipeline for GKE Autopilot orchestrated via GitHub Actions and Terraform. This project implements a 'zero-trust' security model by leveraging Workload Identity Federation (WIF) to eliminate long-lived service account keys, ensuring a hardened CI/CD workflow from code commit to deployment.
This package helps administrators of Forgejo (or Git hosting platforms) generate clear, actionable anti-crawling measures by analyzing user-provided text inputs. When given a description of suspicious
Azure Policy Governance and Compliance Automation framework, enabling seamless management, monitoring, and enforcement of policies in Azure
🐉 Experience a detailed showcase of exploit discovery, analysis, reproduction, and documentation of five XSS vulnerabilities impacting an outdated WordPress version. 🔍💻📄
A Grimoire for Paranoid GPG Generation That Would Make Stallman Cry Tears of Pure Entropy
Azure Policy Governance and Compliance Automation framework, enabling seamless management, monitoring, and enforcement of policies in Azure
Personal cybersecurity website showcasing research, tools, and technical writeups.
Production-grade AWS infrastructure with automated deployment pipeline implementing security-first DevOps practices and multi-stage vulnerability scanning
Add a description, image, and links to the security-best-practices topic page so that developers can more easily learn about it.
To associate your repository with the security-best-practices topic, visit your repo's landing page and select "manage topics."